How much crossover should banking institutions rely upon as they evaluate authentication standards for retail vs. commercial accounts? Online security expert Christopher Beier offers insights.
The BlackBerry disruption strikes at a core IT security precept: availability. Yet, as cybersecurity and IT architecture practitioner Winn Schwartau points out, it also raises the less-often talked about proposition of accountability.
What fraud and security issues does Paul Smocer, the new president of BITS, see as being top concerns in the coming year? Mobile payments, social media, and a strong need for institutions and organizations to comply with existing guidance top the list.
Roger Baker, CIO at the Department of Veterans Affairs, outlines the department's mobile device security strategy, providing details on the rollout of iPhones and iPads.
By using federated digital credentials, the federal government has taken a significant step toward creating more efficiency to better serve the needs of the American people in the 21st century, Cybersecurity Coordinator Howard Schmidt says.
Criminals manipulate an ATM so that the cash requested is blocked or trapped. Once the user gives up and leaves the ATM, the fraudsters come in and remove the cash. So, how can banks prevent this scam?
Security company MXLabs says a phishing scam targeting customers at Netherlands-based SNS Bank fools users by convincing them to fill out attached Web forms.
Mike Brown and Amry Junaideen see audits as great tools to promote heftier IT security budgets, substantiating where dollars should be spent to safeguard an organization's information systems and assets.
Facial recognition, arguably, is the technology that most threatens individual privacy online, and that's on the mind of Senate Commerce Committee Chairman Jay Rockefeller, who has asked the FTC to report on its growing use.
Investigators have linked a retail-credit scheme to a pair of fraudsters who are believed to have stolen $9 million from 8,000 victims. How could such a scheme go undetected for 15 years?
The latest guidance issued by the Federal Financial Institutions Examination Council draws a line of clear distinction between the types of knowledge-based authentication available - from static challenge questions, such as those derived from customer enrollment information, to dynamic KBA sessions that serve as part...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.